Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: pass65

Pass the Fortinet Certified Solution Specialist FCSS_SASE_AD-23 Questions and answers with ValidTests

Exam FCSS_SASE_AD-23 All Questions
Exam FCSS_SASE_AD-23 Premium Access

View all detail and faqs for the FCSS_SASE_AD-23 exam

Viewing page 1 out of 1 pages
Viewing questions 1-10 out of questions
Questions # 1:

When deploying FortiSASE agent-based clients, which three features are available compared to an agentless solution? (Choose three.)

Options:

A.

Vulnerability scan

B.

SSL inspection

C.

Anti-ransomware protection

D.

Web filter

E.

ZTNA tags

Expert Solution
Questions # 2:

What are two advantages of using zero-trust tags? (Choose two.)

Options:

A.

Zero-trust tags can be used to allow or deny access to network resources

B.

Zero-trust tags can determine the security posture of an endpoint.

C.

Zero-trust tags can be used to create multiple endpoint profiles which can be applied to different endpoints

D.

Zero-trust tags can be used to allow secure web gateway (SWG) access

Expert Solution
Questions # 3:

Refer to the exhibit.

Question # 3

To allow access, which web tiller configuration must you change on FortiSASE?

Options:

A.

FortiGuard category-based filter

B.

content filter

C.

URL Filter

D.

inline cloud access security broker (CASB) headers

Expert Solution
Questions # 4:

How does FortiSASE hide user information when viewing and analyzing logs?

Options:

A.

By hashing data using Blowfish

B.

By hashing data using salt

C.

By encrypting data using Secure Hash Algorithm 256-bit (SHA-256)

D.

By encrypting data using advanced encryption standard (AES)

Expert Solution
Questions # 5:

Refer to the exhibit.

Question # 5

The daily report for application usage shows an unusually high number of unknown applications by category.

What are two possible explanations for this? (Choose two.)

Options:

A.

Certificate inspection is not being used to scan application traffic.

B.

The inline-CASB application control profile does not have application categories set to Monitor

C.

Zero trust network access (ZTNA) tags are not being used to tag the correct users.

D.

Deep inspection is not being used to scan traffic.

Expert Solution
Questions # 6:

Which two deployment methods are used to connect a FortiExtender as a FortiSASE LAN extension? (Choose two.)

Options:

A.

Connect FortiExtender to FortiSASE using FortiZTP

B.

Enable Control and Provisioning Wireless Access Points (CAPWAP) access on the FortiSASE portal.

C.

Enter the FortiSASE domain name in the FortiExtender GUI as a static discovery server

D.

Configure an IPsec tunnel on FortiSASE to connect to FortiExtender.

Expert Solution
Questions # 7:

Refer to the exhibits.

Question # 7

Question # 7

When remote users connected to FortiSASE require access to internal resources on Branch-2. how will traffic be routed?

Options:

A.

FortiSASE will use the SD-WAN capability and determine that traffic will be directed to HUB-2. which will then route traffic to Branch-2.

B.

FortiSASE will use the AD VPN protocol and determine that traffic will be directed to Branch-2 directly, using a static route

C.

FortiSASE will use the SD-WAN capability and determine that traffic will be directed to HUB-1, which will then route traffic to Branch-2.

D.

FortiSASE will use the AD VPN protocol and determine that traffic will be directed to Branch-2 directly, using a dynamic route

Expert Solution
Questions # 8:

Refer to the exhibit.

Question # 8

In the user connection monitor, the FortiSASE administrator notices the user name is showing random characters. Which configuration change must the administrator make to get proper user information?

Options:

A.

Turn off log anonymization on FortiSASE.

B.

Add more endpoint licenses on FortiSASE.

C.

Configure the username using FortiSASE naming convention.

D.

Change the deployment type from SWG to VPN.

Expert Solution
Questions # 9:

Which policy type is used to control traffic between the FortiClient endpoint to FortiSASE for secure internet access?

Options:

A.

VPN policy

B.

thin edge policy

C.

private access policy

D.

secure web gateway (SWG) policy

Expert Solution
Viewing page 1 out of 1 pages
Viewing questions 1-10 out of questions